Hack into Any WIFI network

Jayrajsinh Chauhan
5 min readMar 8, 2022

This Practical is For Educational Purpose only.

Here I am Attacking on my Wifi network so I am not responsible for any Harm you made using this Practical !

There are some requirements to complete this Practical Successfully.

Requirements :-

1. 2 Wifi adapters that support packet injection and monitor mode.

2. Kali linux OS

3. Wifi of a Victim

If you don’t have wifi adapter then watch this blog -https://jayrajsblog.blogspot.com/2022/02/budget-wifi-adapters-to-start-your.html

Now let’s start the practical — —

Before starting kindly attach both the adapters to your system and then reboot it after connecting.

Step 1 — Clone this repo. at desktop

Command — git clone https://github.com/FluxionNetwork/fluxion.git

Step 2 — Move to Fluxion directory

Command — cd fluxion

Step 3 — Fluxion needs some dependencies to work properly so we had to install it.

Command — sudo ./fluxion.sh -i

Step 4 — Select english language by typing 5 and then press enter.

Step 5 — We will select Handshake snooper to get the password(hashed) of the victim.

Step 6 — Select any of your adapter for target Searching.

Step 7 — Select 3 for searching both 2 and 5 GHZ channels.

Step 8 — Press Ctrl+c when you see your victim SSID(wifi name) here.

We are going to target D@nny here(It’s my Wifi)

Step 9 — Press 8 to select victim

Step 10 — Select any one wifi adapter from list.

Step 11 — Select airplay-ng deauthentication method.

Step 11 — select any one adapter for monitoring and jamming the network.

Step 12 — select cowpatty verification

Step 13 — Select 30 second(option 1)

Step 14 — Select option 2

Step 15 — It will start to send deauth packets to the wifi and trying to capture.

Step 16 — Wait until this attack completed message appears.

Step 17 — Select another attack by pressing 1.

Step 18 — Now select captive portal attack.

Step 19 — now select 1

Step 20 — now select a device for target tracking.

Step 21 — Now select the same adapter that you select in above step.

Step 22 — Now select the different adapter then above because this attack needs two adapter for attacking.

One adapter for de authentication attack.

And second adapter for Creating a Fake access point like victim.

Step 23 — now select mdk3

Step 24 — Now select option 1 which is recommended

Step 25 — now select cow patty(bcoz we have hash captured in cowpatty verification method so to deauthenticate it we need this).

Step 26 — select 1 as we have captured the hash and it is stored in file in our system.

Step 27 — select 2nd option.

Step 28 — Now we are towards creating the fake access point. Select 1

Step 29 — to keep disconnected while Fake access point is on type 1

Step 30 — As we guess the router or by can physically verify the router manufacter to create the Fake login page.(Mine was TPlink)

Step 31 — Now the Fake firmware page was shown on the device.

Step 32 — As soon as victim enters the password the page disappers and the victim will be automatically connected to the original wifi he belongs.

Step 33 — Now you will se this type of message on kali.

Step 34 — To see the password of Victim, Locate to the directory shown in Screenshot.

So. the practical ends here !!!

JAYRAJSINH CHAUHAN

--

--